Analysis
-
max time kernel
140s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
24-04-2024 02:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-04-24_bf20b00f19c3a575aa9dd6d4cf73f93a_ryuk.exe
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-04-24_bf20b00f19c3a575aa9dd6d4cf73f93a_ryuk.exe
Resource
win10v2004-20240412-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-04-24_bf20b00f19c3a575aa9dd6d4cf73f93a_ryuk.exe
-
Size
1.7MB
-
MD5
bf20b00f19c3a575aa9dd6d4cf73f93a
-
SHA1
721d896d78d3e333ef15387db4d98cc582be4afb
-
SHA256
84e638f09d61bafd2622e3dc019d3443055a12c516c6f8483fe812560685943a
-
SHA512
fbfb83e511251e557e9fee1f6d251eeaa08efa2da1bc1ef32dd176ecb1088caab064297a7f4ffa637109c4dff6353c683dea58f15ea331a6488b4c913d803e93
-
SSDEEP
24576:EANw243LTNjx+mZCkt76f/24pN+XNqNG6hditW:Eew2sf9Ckt7c20+9qNxUW
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 2024-04-24_bf20b00f19c3a575aa9dd6d4cf73f93a_ryuk.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3016 2024-04-24_bf20b00f19c3a575aa9dd6d4cf73f93a_ryuk.exe